CN103761455B - File management system and method - Google Patents

File management system and method Download PDF

Info

Publication number
CN103761455B
CN103761455B CN201310744023.9A CN201310744023A CN103761455B CN 103761455 B CN103761455 B CN 103761455B CN 201310744023 A CN201310744023 A CN 201310744023A CN 103761455 B CN103761455 B CN 103761455B
Authority
CN
China
Prior art keywords
file
control
encryption
document
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310744023.9A
Other languages
Chinese (zh)
Other versions
CN103761455A (en
Inventor
林建志
黄科森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inwellcom Tech Co Ltd
Original Assignee
Inwellcom Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inwellcom Tech Co Ltd filed Critical Inwellcom Tech Co Ltd
Priority to CN201310744023.9A priority Critical patent/CN103761455B/en
Publication of CN103761455A publication Critical patent/CN103761455A/en
Application granted granted Critical
Publication of CN103761455B publication Critical patent/CN103761455B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file management system and method. The file management system comprises a certification device, a control device and a monitoring device. A first processor of the control device generates an encrypted file according to certification information of a primary file and an encrypted file, stores encrypted file certification information which can decode the encrypted file into the certification device and further sets file management information to be stored into the certification device to control using conditions of the encrypted file. A second processor of the monitoring device read the encrypted file certification information and the file control information in the certification device to use and control the encrypted file, meanwhile stores file utilization information to the certification device and the monitoring device to back transmit to the control device.

Description

File management system and method
Technical field
The present invention relates to a kind of file management system and method, more particularly to it is a kind of using encryption, file privilege limit with And the mode of file usage record is managing the system and method for file.
Background technology
With the development of internet, the transmission of electronic data also increasingly facilitates, by the data transfer mode of network, Just directly data can be transmitted into any end points for having with network and being connected, accordingly, without by data manpower transmission by way of, The other end is transferred data to, the manpower round time is greatly reduced, therefore, data are entered between different end points by network Row transmission, this mode has the advantages that high-timeliness.
Additionally, also data can be sent in network hard disc by network, subsequently, just can it is any have a network where, The data are downloaded and used from the network hard disc.However, by network automatic network hard disc the data being downloaded or being incited somebody to action During the data are uploaded to network hard disc, if intentionally personage is intercepted or stolen the data that are intended to upload or download, will cause Data is violated user's original idea and is flowed out, and when the computer or network hard disc of user are invaded by network hacker, also will Significant data in being stored in computer or network hard disc is stolen.
General company or the data of enterprise, are stored in computer by way of electronization, and wherein considerable text Part is classified papers, if company computer suffers hacker attacks, classified papers will be stolen by hacker, occurs what confidential data leaked Situation, if Company Confidential data leak, will cause the beyond measure loss with redemption to company.For example, building industry and electricity The design drawing of road design wave parameter, the program source code of Software for Design industry, the song of Cultural and Creative Industries or ad content and gold Melt personal data of industry etc., if the situation that the file content of the above leaks, to company or the goodwill and image of enterprise, Or even business revenue will cause strong influence with loss.
Furthermore, because electronic data is easily replicated, also because of the convenience of network, therefore, electronic data is easily by net Network is transmitted and leaked.For electronic data is compared to old hard copy data, electronic data can store considerable data volume In a storage device easy to carry, not as conventional hard copy data, in addition it is also necessary to which a large amount of manpowers move to take movement with material resources.And electricity The reading of subdata with replicate, can change from distal end, read or replicate by network, be stolen also therefore easily and leak and Without being felt so that have no way of being prevented in the very first time or carry out infringement keyholed back plate.
Prior art is to use a password by data encryption, when encryption data is sent to a user by data owner Afterwards, the password need to be informed user by oral or other modes, allows user to be able to use the encryption data, to prevent Unauthorized personnel steal the content of the data.But using during general password encryption, the password needs voluntarily to remember, therefore close The generally unsuitable too complex of code, and then cause the password to be easily cracked.And when the encryption data is sent to the user, this makes User is just welcome using the encryption data after knowing the cipher, while welcome transmit in password and the encryption data To third party user, if there is the situation that data leak, it is not easy to differentiate attribution of liability.
Furthermore, the owner of the encryption data is after the encryption data is spread out of, if password is informed into user, Just follow-up keyholed back plate cannot be again done, is that the uncontrollable user leaks password with data, and then cause the outflow of data. Additionally, after the user uses the encryption data, editable or changing the encryption data, and arbitrarily spread amended number According to, cause mistake information transmission.And if user backs up the encryption data after decryption in each different main frame, the 3rd Square user is just welcome to be watched and uses, and the confidentiality for causing data is scattered and disappeared.If consequently, it is possible to only permitting part personage Viewing and the confidentiality data for using, just cannot send user to and use using this kind of mode, thus cannot enjoy meter The convenience produced under calculation machine and the Internet explosion.And the owner of the encryption data is delivered for use the encryption data After person's use, the flow direction of the keyholed back plate encryption data is not simply failed to, also cannot carry out ageing keyholed back plate, nothing for the encryption data The useful life of the method management and control data.Therefore existing electronic data occupation mode will certainly will be improved further.
The content of the invention
In view of the shortcoming of aforementioned prior art, present invention is primarily targeted at providing a kind of file management system.Should File management system is to be protected by the file of need for confidentiality, only allows authorized user to use this document, and can enter one Step limits the right that the use file number of times of user, file content are replicated or transmitted, with monitoring and management and control this document.
To achieve the above object of the invention, the technology used in the present invention means are to make this document management system include:
One authentication device, one has the electronic installation of storage area;
One control device, includes a first processor, and the processor is according to an original document and an encryption document authentication Information, produces one and encrypts file, and for setting file management and control regulation, and the setting value specified according to this document management and control, A file management and control information is produced, and the encryption document authentication information and this document management and control information are stored in into the authentication device;
One supervising device, includes a second processing device, and the processor reads the encryption document authentication in the authentication device Information and file management and control information, and it is authenticated ratio to encrypting file using the encryption document authentication information stored in authentication device It is right, and when comparison result is identical, according to the file management and control regulation of the file management and control information of the authentication device, use should add ciphertext Part, and when difference, prohibit the use of the encryption file;And
Wherein the authentication device is selectively electrically connected to the control device or the supervising device.
To achieve the above object of the invention, the present invention is still using another kind of technological means, there is provided a kind of file management method, It includes an encryption method and a decryption method;
Wherein the encryption method includes following steps:
Confirm file management and control regulation;
Set up file management and control information;
According to an original document and an encryption document authentication information, produce one and encrypt file;
Confirm whether authentication device successfully electrically connects;If so, next step is then performed;If it is not, then reaffirming that certification is filled Put and whether successfully electrically connect;And
Storage encryption document authentication information and file management and control information are in authentication device;
Wherein the decryption method includes following steps:
Confirm whether authentication device successfully electrically connects;If so, next step is then performed;If it is not, then reaffirming that certification is filled Put and whether successfully electrically connect;
The encryption file is authenticated using the encryption document authentication information stored in authentication device comparing;If comparing knot It is really identical, then perform next step;If it is not, then terminating the decryption method;And
Encryption file is used according to file management and control regulation.
The present invention is with double protection mechanism, to protect the information content of the encryption file.First weighs preventing mechanism is According to an original document and an encryption document authentication information, produce one and encrypt file, and the encryption document authentication information is stored In an authentication device.Encryption file after encryption, then must be by storing the certification of the encryption document authentication information Device could be used, and be the encryption document authentication information in the authentication device when using the encryption file, judge to add Whether ciphertext part can be decrypted using.In other words, the first weight preventing mechanism of the invention is to gather around for non-scripture part The person's of having permission or the management and control of the user for authorizing so as to the encryption file cannot be used.Second weight preventing mechanism sets a file Management and control regulation, to produce a file management and control information, and is stored in the authentication device, in using the encryption by this document management and control information During file, further according to the file management and control information in the authentication device of being stored in, monitoring and the use of the management and control encryption file Situation, to guarantee that encrypting file cannot be passed by scripture part owner permission or the user for authorizing duplication, acquisition picture or network Defeated mode steals the content of the encryption file, it is to avoid the facts that encryption file content is usurped occurs.In other words, this The second bright weight preventing mechanism is the management and control of the user for allowing for scripture part owner or authorizing, and makes authorized use Person, also by the management and control of file owner, allows the occupation mode of file to be can be gathered around by file while using the encryption file Desired by the person of having.
Encryption file after present invention encryption, needs the authentication device to decrypt and use, and should add in use During ciphertext part, the use situation of the file management and control Information Security Management encryption file that can be subject in the authentication device, by this two kinds Preventing mechanism, the encryption file arbitrarily cannot be used or propagated.If user does not have the authentication device, cannot make With the encryption file, therefore the encryption file is during transmission, even if file is intercepted or stolen by intentionally personage, intentionally personage Also file cannot be used in the case of not there is no authentication device, and then can ensure that the data in file will not flow out.And use The authentication device can be also monitored further and the management and control encryption file using during the encryption file, using forbidding file to replicate, Limit file use time, limit file printout number of times, using during file add watermark, mimeograph documents when plus watermark, Prohibit the use of the modes such as network transmission file content to further ensure that the security of the encryption file.When actually used, should Encryption file directly can send user to by network, allow user to be able to easily obtain the encryption file, and without the need for load Whether the heart encryption file can leak because of being stolen, and seem mailing by other means, the mode of class paid face to face User is given by the authentication device, the encryption file is used using the authentication device to guarantee the grantee.And should There is file management and control information in authentication device, with monitor and the management and control encryption file behaviour in service, without worry should plus ciphertext Part is abused.
Describe the present invention below in conjunction with the drawings and specific embodiments, but it is not as a limitation of the invention.
Description of the drawings
The system architecture schematic diagram of Fig. 1 present pre-ferred embodiments;
The system block diagram of Fig. 2 present pre-ferred embodiments;
The flow chart of Fig. 3 encryption methods of the present invention;
The flow chart of Fig. 4 decryption methods of the present invention.
Wherein, reference
1 control device
The authentication module of 10 first processor 11
The original document of 12 file encryption module 121
122 encryption file 13 management and control regulation setting modules
The operation note logging modle of 14 degree of secrecy setting module 15
The first network link block of 16 file use information enquiry module 17
2 supervising devices
The authentication device drive module of 20 second processing device 21
The file management and control of 22 file decryption module 221 regulation uses module
The file management and control of 23 file use information logging modle 24 specifies update module
25 second network connecting modules
30 authentication devices
The mnemon of 40 server 41
42 operation information logging modles
50 networks
Specific embodiment
With the following drawings and preferred embodiments of the present invention, the present invention is expanded on further to reach predetermined goal of the invention institute The technological means taken.
Refer to shown in Fig. 1, the present invention be a file management system, and include a control device 1, a supervising device 2, One authentication device 30 and a server 40.The authentication device 30 is an electronic installation with storage area.The server 40 is With the mnemon 41 for storing a file management and control database.In this preferred embodiment, the control device 1 and the monitoring Device 2 can be a mobile computer, a desktop computer, tablet PC or intelligent mobile phone.The authentication device 30 can be One USB Portable disks, eSATA Portable disks, the device with wireless communication capability, for example, the mobile phone with Bluetooth function, have The mobile phone of WiFi function, the mobile phone with infrared function and the identification card and its card reader of identity can be recognized.For example, should The identification card that identity can be recognized can be natural person's identity documents, employee's identification card or EasyCard of signing etc..
Refer to shown in Fig. 2, the control device 1 includes a first processor 10, the first processor 10 includes one Authentication module 11, a file encryption module 12, the management and control regulation first network link block 17 of setting module 13 and. When using, first the authentication device 30 is connected with the control device 1, and after using finishing, disconnects the authentication device 30 and be somebody's turn to do The connection of control device 1.In this preferred embodiment, the connected mode of the authentication device and the control device or the supervising device Can be for USB interface, SATA interface, eSATA interfaces, IEEE1394 interfaces, pcmcia interface, wireless communication interface (such as:WiFi、 Bluetooth, infrared ray, NFC, ZigBee, Wireless USB) or serial port interface is (such as:RS232、RS422、RS485).
The authentication module 11 is used for one user's account number of confirmation and password, and in confirmation user's account number and password For it is correct when, the control device 1 is logined, with using the modules in the control device 1.And in user's account number and password During mistake, forbid logining the control device 1.
This document encrypting module 12 is, according to an original document 121 and an encryption document authentication information, to produce one plus ciphertext Part 122, and the encryption document authentication information is stored in the authentication device 30.In this preferred embodiment, the encryption file The content of authentication information is included when being used using the decryption information needed for the encryption file 122 and the management and control encryption file 122 Between required file digital finger-print (such as MD5).
The management and control regulation setting module 13 is used for setting one file management and control regulation, and the setting specified according to this document management and control Value, produces a file management and control information, and this document management and control information is stored in the authentication device 30, and by first net Network link block 17 is connected by network 50 or wired connection is sent in the file management and control database of the server 40 and stores.Should File management and control specifies for the service condition of management and control user.In this preferred embodiment, the content bag of this document management and control information Setting value, the backup connection of original document 121, the original text specified containing file user's title, file name, file management and control The digital finger-print (such as MD5) of part 121 and the setup time of the file management and control information.
In this preferred embodiment, this document management and control regulation is included:When the encryption file 122 is used, automatically addition is literary Word and image swim to be printed in display result;When the encryption file 122 is printed, automatically addition writings and image is swum to be printed on and is beaten In print result;The non-print encryption file 122;Picture is prohibitted the use of to capture or make video recording function to capture the encryption file 122 Content;Forbid replicating or changing the content of the encryption file 122;Deposit in memory body after network transmission that no thoroughfare decryption File content.For example, it is to prohibit the use of cutting, replicate and sticking for scrapbook that this forbids the file management and control for replicating regulation Function;Prohibit the use of towing copy function;Prohibit the use of and separately deposit new file function;Forbid being printed out with virtual printer and be The mode of file carrys out reproducting content.Adding watermark system when the encryption file 122 is used and preventing intentionally personage from using any has The make video recording device of function of taking pictures steals encryption file content to shoot display result.
Additionally, this document management and control specifies can also further select the access times for whether limiting the encryption file 122, should add The useful life of ciphertext part 122, add using the use time of the encryption file 122, using the time of the encryption file 122 every time Always, the printing times of the encryption file 122, the authentication device 30 are filled every time using the time and the certification of the encryption file 122 Putting 30 can use the total time of the encryption file 122.For example, when the access times of file are limited, once number of times is reached The upper limit, then file can be automatically deleted.When the useful life of file is limited, once useful life is reached, then file can be deleted automatically Remove.When the time for using file every time is limited, once use time is reached, then file can be automatically deleted.Text is used when limiting During the total time of part, once the total time that file is used reaches, then file can be automatically deleted.When limiting, the authentication device 30 is each During the time that can use file, reach once the time, then file is automatically switched off.Can be using text when the authentication device 30 is limited During the total time of part, once total time reaches, then the authentication device 30 just cannot reuse any file.And when restriction file During printing times, once printing times reach the upper limit, then file can be automatically deleted.In this preferred embodiment, this uses action It is to refer to the execution action for performing file, or opens the breakdown action of generic-document.
The first processor 10 of the control device 1 further includes a degree of secrecy setting module 14, an operation note The file use information enquiry module 16 of logging modle 15 and.
The degree of secrecy setting module 14 be a degree of secrecy information of setting up in the encryption document authentication information, make to have The encryption file 122 of the degree of secrecy information becomes an encryption file 122 with degree of secrecy.When actually used, the original The owner of beginning file 121 is intended to for encryption file 122 to license to the specific user of some of user (for example, Part high-order supervisor in all office workers of company), using encryption file 122, it is necessary to set the degree of secrecy information, makes Tool meets the specific user of degree of secrecy, could use the encryption file 122 of the degree of secrecy, and the encryption file 122 cannot Used by the user that there is no the degree of secrecy.
The operation note logging modle 15 is to operate the operation note of the control device 1 to record user, and is produced A raw operation information, is connected by network 50 by the first network link block 17 or wired connection is sent to the server 40 File management and control database in store, allow manager that various file authorizing behaviors can be checked by the operation note.At this In preferred embodiment, the content system of the operation information includes user's account number, operating time, encrypts whether file 122 belongs to Degree of secrecy and the title of the encryption file 122 recipient.
This document use information enquiry module 16 is one file use information of inquiry, to be supplied to gathering around for original document 121 The person of having follows the trail of the behaviour in service of the encryption file 122.This document use information enquiry module 16 be from the server 40 or this recognize Card device 30 reads this document use information.In this preferred embodiment, this document use information includes the encryption file 122 Title, every time using the time of the encryption file 122, close the time of the encryption file 122 and making for the encryption file 122 Use number of times.
And the supervising device 2 includes a second processing device 20, the second processing device 20 includes authentication device driving Module 21, a file decryption module 22 and file management and control regulation uses module 221.When to use encryption file 122, use Person first must electrically connect the authentication device 30 with the supervising device 2, and when user is intended to stop using encryption file 122, Disconnect the electrical connection of the authentication device 30 and the supervising device 2.
The authentication device drive module 21 is used to drive the authentication device 30, is stored in the authentication device 30 with reading Encryption document authentication information and file management and control information.This document deciphering module 22 is used for using the encryption for being stored in authentication device 30 Document authentication information is authenticated comparing to the encryption file 122, and when comparison result is identical, user can use plus ciphertext Part 122.This document management and control specify using module 221 be according in the authentication device 30 store file management and control information file pipe Regulatory control uses the encryption file 122 surely;And when certification comparison result is different, supervising device 2 will be prohibited from using this plus ciphertext Part 122.It is to specify to use and manage according to the file management and control of the setting of control device 1 that this document management and control specifies using module 221 Control the encryption file 122.For example, this document management and control regulation is first to check whether useful life expires using module 221, if Expire, then the encryption file is deleted or prohibitted the use of to the encryption file 122 by the setting for being specified according to this document management and control 122, also or show one beyond useful life hint image.
Additionally, when the encryption file 122 is the encryption file 122 that has degree of secrecy, this document deciphering module 22 Just further using in authentication device 30 store degree of secrecy information confidential information comparison is carried out to the encryption file 122, when When comparison result is identical, using the encryption file 122 of the degree of secrecy;And when confidential information comparison result is different, forbid making With the encryption file 122 of the degree of secrecy.
Additionally, the second processing device 20 of the supervising device 2 further includes a file use information logging modle 23, File management and control specifies the network connecting module 25 of update module 24 and 1 second.
This document use information logging modle 23 is to record the title of the encryption file 122, use the encryption file every time The access times of 122 time, the time for closing the encryption file 122 and the encryption file 122, to produce this document letter is used Breath, and this document use information is sent to the file of the server 40 by network 50 by second network connecting module 25 Management and control database is stored, and directly this document use information is stored in the authentication device 30.If but the supervising device 2 is not having In the case of being connected to network 50, then only this document use information need to be stored in the authentication device 30.Consequently, it is possible to former The owner of beginning file 121 just can be by network 50, the file use information in reading this document management and control database, or by The authentication device 30 is reclaimed, to learn the use situation of the encryption file 122.Furthermore, the supervising device 2 is to include One storage element (not shown), and no matter the supervising device 2 whether there is and is connected to network 50, all further can use this document Information is stored in the storage element of the supervising device 2.In other words, when the supervising device 2 has network 50 in succession, this document makes Can carry out tripartite's record with information logging modle 23, if without networking network 50 when, this document use information logging modle 23 can be carried out Both sides record, and wait the supervising device 2 that the usage record is sent to the file of the server 40 when having network 50 in succession Management and control database is stored.
This document management and control regulation update module 24 is to be connected to this by network 50 by second network connecting module 25 Server 40, and compare file management and control regulation and the certification of file management and control information in the file management and control database of the server 40 In device 30 the file management and control of file management and control information define whether it is identical, if differing, by file pipe in the authentication device 30 The file management and control of control information specifies the file management and control of file management and control information in the file management and control database for be updated to the server 40 Regulation.
It is to be selectively electrically connected to the control device 1 or the supervising device 2 in the authentication device 30, and the authentication device 30 be one can stored electrons data electronic installation, to store the encryption document authentication information and this document management and control information, with And selectively store this document use information.
The server 40 is electrically connected to the control device 1, and includes a mnemon 41 and operation information record mould Block 42, the mnemon 41 stores the backup of this document management and control database and original document 121.The operation information logging modle 42 is to transmit this document management and control information each time in the control device 1 or supervising device 2 transmits each time this document use information During to this document management and control database, a server operation information is produced, and be stored in the mnemon 41.In this preferred embodiment In, the server operation packet contains user's account number, time and the corresponding file name of transmission data.
Refer to shown in Fig. 3, the file management method of the present invention includes an encryption method and a decryption method, wherein should Control device 1 performs the encryption method, and the encryption method includes following steps:
Confirm that a file management and control specifies (S31);
Set up file management and control information (S32);
It is connected to a server 40 (S33);
Storage this document management and control information is in the server 40 (S34);
An original document 121 is backed up in the server 40 (S35);
According to the encryption document authentication information of original document 121 and, produce one and encrypt file 122 (S36);
Confirm whether an authentication device 30 successfully electrically connects (S37);If so, next step is then performed;If it is not, then again true Whether the authentication device 30 successfully electrically connects (S37);And
The encryption document authentication information and this document management and control information are stored in the authentication device 30 (S38).
Refer to shown in Fig. 4, the supervising device 2 performs the decryption method, the decryption method includes following steps:
Confirm whether authentication device 30 successfully electrically connects (S40);If so, next step is then performed;If it is not, then reaffirming Whether authentication device 30 successfully electrically connects (S40);
The encryption file 122 is authenticated using the encryption document authentication information stored in authentication device 30 comparing (S41);If comparison result is identical, next step is performed;If it is not, then terminating the decryption method;And
According to file management and control regulation using encryption file 122 (S48), and store files use information is in authentication device 30 (S49)。
The supervising device 2 further includes a storage element (not shown), and when the decryption method is exempted to install in one During pattern, following steps are further includeed:
It is confirmed whether to be connected to network (S42);If it is not, then according to file management and control regulation using encryption file 122 (S48), And store files use information is in the authentication device 30 (S49);If so, next step is then performed;
By network connection to the server 40 (S43);
Check that this document management and control defines whether to need to update (S44);If so, this document management and control regulation (S45) is then updated, and Perform next step;If it is not, then directly performing next step;
Encryption file 122 (S46) is used according to this document management and control regulation;
Storage this document use information is in the server 40 and the authentication device 30 (S47).
And when the decryption method is in an Installation Modes, further include following steps:
It is confirmed whether to be connected to network (S42);If it is not, then according to file management and control regulation using encryption file 122 (S48), And store files use information is in the authentication device 30 and the storage element (S49);If so, next step is then performed;
By network connection to the server 40 (S43);
Check that this document management and control defines whether to need to update (S44);If so, this document management and control regulation (S45) is then updated, and Perform next step;If it is not, then directly performing next step;
Encryption file 122 (S46) is used according to this document management and control regulation;
Storage this document use information is in the server 40 and the authentication device 30 and the storage element (S47).
For example, this exempt from Installation Modes refer to the supervising device 2 be using be stored in it is various in the authentication device 30 Module is completing above-mentioned decryption method.And the Installation Modes refer to that the supervising device 2 is to use to be stored in the storage element Various modules completing above-mentioned decryption method.
Refer to shown in Fig. 1, when the owner of the original document 121 is intended to carry out making encryption file 122 using the present invention When, file owner first input correct user's account number and password, to login the control device 1, and sets original document This document management and control regulation, produces according to this file management and control information, to limit access right of the user using encryption file 122, Then according to the encryption document authentication information of original document 121 and, produce one and encrypt file 122, subsequently, then this is added into ciphertext Part authentication information and this document management and control information are stored in the authentication device 30.Meanwhile, the original document 121 is backed up to into the clothes In business device 40.
Furthermore, the encryption file 122 is utilized portable media storage device by file owner, by the encryption file 122 are stored in portable media storage device, are electrically connected with supervising device 2 by portable media storage device, monitoring dress Put 2 and read the encryption file 122 from portable media storage device, or be sent to the encryption file 122 by network 50 The supervising device 2.
Specifically, by way of file owner can face to face pay the authentication device 30 mailing or directly, will add Ciphertext part consigns to the user of encryption file 122 approved by the owner of the original document 121, electric by the authentication device 30 The supervising device 2 is connected to, to drive and the encryption document authentication information and this document being stored in the authentication device 30 is read Management and control information, is entered with degree of secrecy information with the encryption document authentication information stored in authentication device 30 to the encryption file 122 Row certification is compared, if comparison result is identical, user just can use the encryption file 122, conversely, working as certification comparison result not When identical, user just cannot according to this use the encryption file 122.Furthermore, after user is using encryption file 122, the prison Control device 2 can be according to file management and control information in the authentication device 30, in addition management and control encryption file 122.For example, forbid making User replicates the encryption file, adds the watermark of writings and image, limits the encryption file when printing encryption file Access times, printing times or useful life.
After the present invention also can be by the original document 121 be encrypted, directly user is sent to by network 50, the encryption File just must can be used by the authentication device 30, therefore, even if the encryption file 122 during transmission by person who is ambitious or tenacious of purpose Scholar intercepts or steals, and data that are intercepted or stealing also cannot be used in the case of not having authentication device 30, to learn Data in the encryption file 122, and the authentication device 30 sends user to (as posted) then by other means, so that tool The authentication device 30 and encryption file 122 for having encryption document authentication information is separately sent to the user, accordingly, the encryption file 122 can't simultaneously be intercepted or steal with the authentication device 30 with encryption document authentication information, should even if stealing or intercepting Encryption file 122 or the authentication device 30 are first, cannot also obtain the information in the encryption file 122.Therefore by the way that this is encrypted File 122 and the authentication device 30 are separately transmitted, and reduce the possibility that data are stolen.
Additionally, the present invention also carrys out management and control user use by the file management and control regulation stored in the authentication device 30 should add The situation of ciphertext part 122, the encryption file 122 cannot be replicated, or privates by printing.Can also further limit the encryption file 122 useful life, access times and printing times.
The present invention because of the occupation mode using entity authentication device, once therefore the authentication device held of grantee lose Lose, the grantee easily will discover so that the file chance stolen because of human factor is substantially reduced.
Certainly, the present invention can also have other various embodiments, ripe in the case of without departing substantially from spirit of the invention and its essence Know those skilled in the art and work as and various corresponding changes and deformation, but these corresponding changes and change can be made according to the present invention Shape should all belong to the protection domain of appended claims of the invention.

Claims (25)

1. a kind of file management system, it is characterised in that include:
One authentication device, one has the electronic installation of storage area;
One control device, includes a first processor, and the first processor is according to an original document and an encryption document authentication Information, produces one and encrypts file, and setting one file management and control regulation, and according to a setting value of this document management and control regulation, produces A raw file management and control information, and the encryption document authentication information and this document management and control information are stored in into the authentication device;
One supervising device, includes a second processing device, and the second processing device reads the encryption document authentication in the authentication device Information and file management and control information, and the encryption file is recognized using the encryption document authentication information stored in authentication device Card is compared, and when comparison result is identical, according to the file management and control regulation of the file management and control information of the authentication device, use should add Ciphertext part, and when difference, prohibit the use of the encryption file;And
Wherein the authentication device is selectively electrically coupled to the control device or the supervising device.
2. file management system according to claim 1, it is characterised in that the first processor of the control device is included Have:
One file encryption module, for according to the original document and the encryption document authentication information, producing the encryption file, and will The encryption document authentication information is stored in the authentication device;
One management and control specifies setting module, for setting this document management and control regulation, and the setting value specified according to this document management and control, produces Raw this document management and control information, and this document management and control information is stored in into the authentication device.
3. file management system according to claim 1 and 2, it is characterised in that the first processor of the control device enters One step includes:
One authentication module, for confirming user's account number and password, and when user's account number and correct password, steps on Enter the control device, with using the modules in the control device, and when user's account number and code error, forbid stepping on Enter the control device.
4. file management system according to claim 1 and 2, it is characterised in that the second processing device bag of the supervising device Contain:
One authentication device drive module, for driving the authentication device, to read the authentication device in encryption document authentication letter Breath and file management and control information;And
One file decryption module, for being recognized the encryption file using the encryption document authentication information stored in authentication device Card is compared, and when comparison result is different, prohibits the use of the encryption file;
One file management and control regulation uses module, when the comparison result of this document deciphering module is identical, according to the authentication device File management and control information file management and control regulation, using the encryption file.
5. file management system according to claim 1 and 2, it is characterised in that the first processor of the control device enters One step includes:
One degree of secrecy setting module, for setting up a degree of secrecy information in the encryption document authentication information.
6. file management system according to claim 1 and 2, it is characterised in that further include:
One server, includes a mnemon, and the mnemon stores a file management and control database.
7. file management system according to claim 6, it is characterised in that the first processor of the control device is further Include:
One first network link block, by network connection to the server;And
One operation note logging modle, for producing an operation information, and is sent to the clothes by the first network link block The file management and control database of business device.
8. file management system according to claim 7, it is characterised in that the operation information include user's account number, Operating time and the title of encryption document receivers.
9. file management system according to claim 1 and 2, it is characterised in that the second processing device of the supervising device enters One step includes:
One file use information logging modle, for producing a file use information, and is stored in this by this document use information Authentication device.
10. file management system according to claim 9, it is characterised in that the supervising device further includes a storage Memory cell, and this document use information is further stored in the monitoring by the file use information logging modle of the second processing device The storage element of device.
11. file management systems according to claim 6, it is characterised in that the second processing device of the supervising device enters one Step includes:
One second network connecting module, by network connection to the server;And
One file use information logging modle, this document use information logging modle is used to produce a file use information, and mat This document use information is stored in by the note of the server to the server by network connection by second network connecting module Recall unit.
12. file management systems according to claim 9, it is characterised in that this document use information includes the encryption The title of file, every time using the time of the encryption file, close the time of the encryption file and the use time of the encryption file Number.
13. file management systems according to claim 9, it is characterised in that the first processor of the control device enters one Step includes:
One file use information enquiry module, for reading the authentication device in file use information.
14. file management systems according to claim 11, it is characterised in that the first processor of the control device enters one Step includes:
One file use information enquiry module, for reading the server in file use information.
15. file management systems according to claim 11, it is characterised in that the second processing device of the supervising device enters one Step includes:
One file management and control specifies update module, by network connection to the server, and for comparing the file pipe of the server The file management and control of file management and control information in control database specifies the file management and control regulation with file management and control information in the authentication device It is whether identical, if differing, the file management and control regulation of file management and control information in the authentication device is updated to into the server The file management and control regulation of file management and control information in file management and control database.
16. file management systems according to claim 1 and 2, it is characterised in that this document management and control packet contains file The backup of setting value, original document that user's title, file name, file management and control specify connects, the numeral of original document refers to The setup time of line and this document management and control information.
17. file management systems according to claim 1 and 2, it is characterised in that this document management and control regulation is included:
When file printout, addition automatically swims to be printed in print result;
When file is used, addition automatically swims to be printed in display result;
Picture is prohibitted the use of to capture or make video recording function to capture file content;
Forbid replicating or changing file content;And
No thoroughfare network transmission file.
18. file management systems according to claim 17, it is characterised in that this document management and control regulation is further included Have:
Limit the access times of file;
Limit the useful life of file;
Limit each use time of file;
Limit the total time that file is used;
Limit the printing times of file;
Limit the time that the authentication device uses every time file;And
Limit the total time that the authentication device uses file.
19. file management systems according to claim 1, it is characterised in that the authentication device is USB Portable disks, eSATA Portable disk or the device with wireless communication capability.
20. file management systems according to claim 1, it is characterised in that the authentication device and the control device should The connected mode of supervising device can be USB interface, SATA interface, eSATA interfaces, IEEE1394 interfaces, pcmcia interface, wireless Communication interface or serial port interface.
21. file management systems according to claim 1, it is characterised in that the encryption document authentication packet contains:Make With the file digital finger-print needed for the decryption information needed for the encryption file and the management and control encryption file use time.
A kind of 22. file management methods, include an encryption method and a decryption method;
Characterized in that, wherein the encryption method is performed by a control device, the encryption method includes following steps:
Confirm file management and control regulation;
Set up file management and control information;
According to an original document and an encryption document authentication information, produce one and encrypt file;
Confirm whether an authentication device successfully electrically connects;If so, next step is then performed;If it is not, then reaffirming the certification dress Put and whether successfully electrically connect;And
Storage encryption document authentication information and file management and control information are in the authentication device;
Wherein the decryption method is performed by a supervising device, and the decryption method includes following steps:
Confirm whether the authentication device successfully electrically connects;If so, next step is then performed;If it is not, then reaffirming the certification dress Put and whether successfully electrically connect;
The encryption file is authenticated using the encryption document authentication information stored in authentication device comparing;If comparison result phase Together, then next step is performed;If it is not, then terminating the decryption method;And
According to file management and control regulation using encryption file, and store files use information is in the authentication device.
23. file management methods according to claim 22, it is characterised in that the encryption method further includes following Step:
It is connected to a server;
Store files management and control information is in the server;And
Backup original document is in the server.
24. file management methods according to claim 22, it is characterised in that the decryption method further includes following Step:
It is confirmed whether to be connected to network;If it is not, and when one exempts from Installation Modes, then according to file management and control regulation using plus ciphertext Part, and store files use information is in the authentication device;If so, next step is then performed;
When this exempts from Installation Modes, by network connection to a server;
Check that a file management and control defines whether to need to update;If so, this document management and control regulation is then updated, and performs next step; If it is not, then directly performing next step;
Encryption file is used according to this document management and control regulation;And
A file use information is stored in the server and the authentication device.
25. file management methods according to claim 22, it is characterised in that the decryption method further includes following Step:
It is confirmed whether to be connected to network;If it is not, and when an Installation Modes, then according to file management and control regulation using encryption file, And store files use information is in the authentication device and a storage element;If so, next step is then performed;
When the Installation Modes, by network connection to a server;
Check that a file management and control defines whether to need to update;If so, this document management and control regulation is then updated, and performs next step; If it is not, then directly performing next step;
Encryption file is used according to this document management and control regulation;And
A file use information is stored in the server, the authentication device and the storage element.
CN201310744023.9A 2013-12-24 2013-12-24 File management system and method Active CN103761455B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310744023.9A CN103761455B (en) 2013-12-24 2013-12-24 File management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310744023.9A CN103761455B (en) 2013-12-24 2013-12-24 File management system and method

Publications (2)

Publication Number Publication Date
CN103761455A CN103761455A (en) 2014-04-30
CN103761455B true CN103761455B (en) 2017-04-12

Family

ID=50528691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310744023.9A Active CN103761455B (en) 2013-12-24 2013-12-24 File management system and method

Country Status (1)

Country Link
CN (1) CN103761455B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573550A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Method and device for protecting data
CN109460963A (en) * 2018-09-26 2019-03-12 平安国际融资租赁有限公司 Electronic signature method, apparatus, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170554A (en) * 2007-09-04 2008-04-30 诸凤璋 Message safety transfer system
CN102185695A (en) * 2009-12-22 2011-09-14 谷电机工业株式会社 Information management system, information management method and apparatus, and encryption method and program

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201205331A (en) * 2010-07-28 2012-02-01 Atp Electronics Taiwan Inc Data secure system, method of storing and reading data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170554A (en) * 2007-09-04 2008-04-30 诸凤璋 Message safety transfer system
CN102185695A (en) * 2009-12-22 2011-09-14 谷电机工业株式会社 Information management system, information management method and apparatus, and encryption method and program

Also Published As

Publication number Publication date
CN103761455A (en) 2014-04-30

Similar Documents

Publication Publication Date Title
CN101729550B (en) Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof
CN100552793C (en) Method and apparatus and pocket memory based on the Digital Right Management playback of content
CN102710633B (en) Cloud security management system of security electronic documents and method
CN101895578B (en) Document monitor and management system based on comprehensive safety audit
CN100541507C (en) Print system, print control program
CN1967558B (en) Image processing system, information processing device, and information processing method
CN103530570A (en) Electronic document safety management system and method
CN105103488A (en) Policy enforcement with associated data
CN103701611A (en) Method for accessing and uploading data in data storage system
CN105191207A (en) Federated key management
EP2323065A1 (en) Method and device of sharing license between secure removable media
TWI499931B (en) File management system and method
CN103745164B (en) A kind of file safety storage method based on environmental and system
CN101989988A (en) Copyright protection system and method of ebook online reading
CN101578610A (en) File access control device and program
CN103080946A (en) Method, secure device, system and computer program product for securely managing files
CN103326999A (en) File safety management system based on cloud service
CN101894242B (en) System and method for protecting information safety of mobile electronic equipment
CN107332666A (en) Terminal document encryption method
CN102799539A (en) Safe USB flash disk and data active protection method thereof
CN106533693A (en) Access method and device of railway vehicle monitoring and maintenance system
CN105790962A (en) Conference document obtaining method, apparatus, and system
CN103178961A (en) Safe information interaction method and related device
CN112329050A (en) File security management terminal and system
CN101841411A (en) Data resource anti-copying encrypted transmission method and device system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant